LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: October 20th, 2014
Linux Advisory Watch: October 17th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Debian: New CUPS packages fix arbitrary code execution Print E-mail
User Rating:      How can I rate this item?
Posted by Joseph Shakespeare   
Debian iDEFENSE has reported a buffer overflow in xpdf, the portable document format (PDF) suite. Similar code is present in the PDF processing part of CUPS. A maliciously crafted PDF file could exploit this problem, resulting in the execution of arbitrary code.
- --------------------------------------------------------------------------
Debian Security Advisory DSA 645-1                     security@debian.org
http://www.debian.org/security/                             Martin Schulze
January 19th, 2005                      http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : cupsys
Vulnerability  : buffer overflow
Problem-Type   : remote
Debian-specific: no
CVE ID         : CAN-2005-0064

iDEFENSE has reported a buffer overflow in xpdf, the portable document
format (PDF) suite.  Similar code is present in the PDF processing
part of CUPS.  A maliciously crafted PDF file could exploit this
problem, resulting in the execution of arbitrary code.

For the stable distribution (woody) this problem has been fixed in
version 1.1.14-5woody12.

In the unstable distribution (sid) CUPSYS does not use its own xpdf
variant anymore but uses xpdf-utils.

We recommend that you upgrade your cups packages.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody12.dsc
      Size/MD5 checksum:      712 dba687dbc0a6992b0a3cdd8da496abdf
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody12.diff.gz
      Size/MD5 checksum:    40770 083cfc2f84280ebaee765ec1ba7a8f29
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14.orig.tar.gz
      Size/MD5 checksum:  6150756 0dfa41f29fa73e7744903b2471d2ca2f

  Alpha architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody12_alpha.deb
      Size/MD5 checksum:  1901080 80c9b14b52397228088eb278ef07d897
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody12_alpha.deb
      Size/MD5 checksum:    74548 98b9ef57c0e574aadf0e804fb070ccff
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody12_alpha.deb
      Size/MD5 checksum:    93196 ebe102c5982747fb36254898db73bdac
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody12_alpha.deb
      Size/MD5 checksum:  2446048 e3509f813586e394fcaea652caeb979d
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody12_alpha.deb
      Size/MD5 checksum:   138216 c6c6beeff4bc077a290bb213ffafcd04
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody12_alpha.deb
      Size/MD5 checksum:   181162 c612bffce4b666c36e9709a3f1c3b916

  ARM architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody12_arm.deb
      Size/MD5 checksum:  1821988 cae79abb7d1980e5cb983c51c23df200
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody12_arm.deb
      Size/MD5 checksum:    68682 2aef42b9bfa45d45a0b94f980cd75f0b
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody12_arm.deb
      Size/MD5 checksum:    85876 c998cf95bd9faa58bbc3618d92c69e3b
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody12_arm.deb
      Size/MD5 checksum:  2346072 24d5e48e3e0319b948038c45b1219b4d
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody12_arm.deb
      Size/MD5 checksum:   113198 4ce263fe2f228ad505e6249869ede086
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody12_arm.deb
      Size/MD5 checksum:   150620 9644fdf3f4c6021a203b1a9811a14de8

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody12_i386.deb
      Size/MD5 checksum:  1788840 4421966dabb586f81791d9d27eaf9ceb
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody12_i386.deb
      Size/MD5 checksum:    68212 af70c5816c54edf896a22c24fe0568b8
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody12_i386.deb
      Size/MD5 checksum:    84376 6178a9c61d805a70e3f787f9cec45d44
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody12_i386.deb
      Size/MD5 checksum:  2312208 53aaab028df004928720cf25e9912298
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody12_i386.deb
      Size/MD5 checksum:   111224 2a6caaceda4a9a617637ffec2e6b0888
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody12_i386.deb
      Size/MD5 checksum:   136782 70d5e60898bf4cb15ec009832f2914ff

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody12_ia64.deb
      Size/MD5 checksum:  2008480 dbd5516b389032d32bed1b3f47157dd6
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody12_ia64.deb
      Size/MD5 checksum:    77618 c93fd0ad5ed158ece2b3bfe820f65c85
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody12_ia64.deb
      Size/MD5 checksum:    97360 d5b475b30e5566ae84e4388a9c8b88ce
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody12_ia64.deb
      Size/MD5 checksum:  2656984 7c862503822e4f2bf4758f7d2359ebc9
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody12_ia64.deb
      Size/MD5 checksum:   156234 67c450bec79adc3790e03933d59f3d37
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody12_ia64.deb
      Size/MD5 checksum:   183182 7f11c1e4644116c23db6b29c73427040

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody12_hppa.deb
      Size/MD5 checksum:  1882020 9c4b419efcb6432c6470c3d1d55d2df4
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody12_hppa.deb
      Size/MD5 checksum:    71014 be0ebd451a3141b3962fe2bdcf6ec50f
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody12_hppa.deb
      Size/MD5 checksum:    90032 a7ba29d9e1c69af6b90f4007d5a74c6f
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody12_hppa.deb
      Size/MD5 checksum:  2456276 65d1e20bf5e1189467226ead52702708
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody12_hppa.deb
      Size/MD5 checksum:   126706 b780b2343e1a4c1f7efbc2e31bf45a5f
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody12_hppa.deb
      Size/MD5 checksum:   159768 aaac5dbdd82b5e781f088687f924a6db

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody12_m68k.deb
      Size/MD5 checksum:  1755578 cba34fd3943f142f9f02349409e0a401
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody12_m68k.deb
      Size/MD5 checksum:    66480 547ceec1de16cd3a30591e0a4d7d522c
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody12_m68k.deb
      Size/MD5 checksum:    81600 92628a29ad3a5c5fe612b5f878747bbb
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody12_m68k.deb
      Size/MD5 checksum:  2261580 76a36d1fbc58b906e9e2aaa3524f788d
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody12_m68k.deb
      Size/MD5 checksum:   106458 5e70c0f80644ae350edc1062877ced89
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody12_m68k.deb
      Size/MD5 checksum:   128992 8ff14878ace478af7a9f2827867a04d1

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody12_mips.deb
      Size/MD5 checksum:  1811940 9ced9be894453681c8f256f67e337751
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody12_mips.deb
      Size/MD5 checksum:    68116 63e45c41ec22bc005663f008aa05ef0b
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody12_mips.deb
      Size/MD5 checksum:    81558 6300fb89191894457fa6672cad347bb4
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody12_mips.deb
      Size/MD5 checksum:  2404826 f8d58e941201559799af19451002a284
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody12_mips.deb
      Size/MD5 checksum:   112996 a4b6ffee4e6cc6a3800c0ef8c20ff539
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody12_mips.deb
      Size/MD5 checksum:   151418 aaae3c74411b75b49dc14def7a9c32fe

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody12_mipsel.deb
      Size/MD5 checksum:  1812724 bbfee7ac7b15145c6f89d4a25c1db340
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody12_mipsel.deb
      Size/MD5 checksum:    68130 d2f7131ac7ea1d6ef729c112b54d5629
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody12_mipsel.deb
      Size/MD5 checksum:    81626 95b08b3d7979b620c77859d15550eaaa
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody12_mipsel.deb
      Size/MD5 checksum:  2407218 9332c2b46d7345b8b15403ca9b6dd028
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody12_mipsel.deb
      Size/MD5 checksum:   112790 45c5412dfdcdad3a59bbc0f2f45988a4
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody12_mipsel.deb
      Size/MD5 checksum:   151276 16c064ce075bf6ce6201312a0843d008

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody12_powerpc.deb
      Size/MD5 checksum:  1800906 08a9bf6cc07cb65c0dd09d52de8f7f0b
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody12_powerpc.deb
      Size/MD5 checksum:    68124 698dbe8709ad4a0dc5de6fafaeb8f3eb
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody12_powerpc.deb
      Size/MD5 checksum:    83694 407fc2c25633d9c2cf26d80bd5f5108c
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody12_powerpc.deb
      Size/MD5 checksum:  2360024 08521680d27782d3e726784997c95566
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody12_powerpc.deb
      Size/MD5 checksum:   117006 9cb07b714e8ab87e79b2ee92dcc7e5d3
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody12_powerpc.deb
      Size/MD5 checksum:   145440 070f2ffcddb4877843d4bc1a948fbe5c

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody12_s390.deb
      Size/MD5 checksum:  1796000 2afd81c2c65e80af6152b6d2a0985ce3
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody12_s390.deb
      Size/MD5 checksum:    69504 a48e8ed2967607f6d96e4c26999d8fec
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody12_s390.deb
      Size/MD5 checksum:    86236 3c51febfd61416b13d42c5c6ab975010
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody12_s390.deb
      Size/MD5 checksum:  2337874 b881b84f338e9cbf2e613f0d2a6453a0
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody12_s390.deb
      Size/MD5 checksum:   115542 33c899990404f7dbd5e5a586b3fc8fa1
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody12_s390.deb
      Size/MD5 checksum:   141064 325c19c262cdd47a35ffabf397b5da2a

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody12_sparc.deb
      Size/MD5 checksum:  1845728 2c1dcbfd9ff9fc25588f908e7ef84446
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody12_sparc.deb
      Size/MD5 checksum:    71068 f687719bc73305a9128ae5707b482f2f
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody12_sparc.deb
      Size/MD5 checksum:    84512 4c0763a89d10e4f48ed35e8807bc2f69
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody12_sparc.deb
      Size/MD5 checksum:  2354898 aafc71eb641ab4c0252b37a163d97f05
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody12_sparc.deb
      Size/MD5 checksum:   120690 72969e3f647ecf37906772aebee2ad57
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody12_sparc.deb
      Size/MD5 checksum:   146974 aff816a314bda12eb5f6ac6bbc3d6816


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Hacker Halted 2014: Johnny Long Calls for Hackers for Charity Volunteers
RIPS – Static Source Code Analysis For PHP Vulnerabilities
Finding a Video Poker Bug Made These Guys Rich—Then Vegas Made Them Pay
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.